tech-invite   World Map     

IETF     RFCs     Groups     SIP     ABNFs    |    3GPP     Specs     Glossaries     Architecture     IMS     UICC    |    search     info

Top          in Index          Prev          Next

TS 102 221 (ETSI SCP)
Smart Cards – UICC-Terminal interface –
Physical and Logical characteristics

|   ToC   |   ETSI-search   |

(P) V13.1.0    2016-05    186 p.
(P) V12.1.0    2015-09    181 p.
(P) V11.1.0    2013/11    180 p.
(P) V10.0.0    2011-12    179 p.
(P) V9.2.0    2010-10    179 p.
(P) V8.5.0    2010-10    174 p.
(P) V7.18.0    2010-10    174 p.
(P) V6.16.0    2010-10    147 p.
(P) V5.10.0    2007-07    125 p.
(P) V4.16.0    2007-07    125 p.
(P) V3.18.0    2007-07    123 p.


See also:  3GPP (CT6) TS 31.101    


The present document defines a generic Terminal/Integrated Circuit Card (ICC) interface.

The aim of the present document is to ensure interoperability between an ICC and a terminal independently of the respective manufacturer, card issuer or operator. The present document does not define any aspects related to the administrative management phase of the ICC. Any internal technical realization of either the ICC or the terminal is only specified where these are reflected over the interface.

Application specific details for applications residing on an ICC are specified in the respective application specific documents. The Universal Subscriber Identity Module (USIM)-application for 3G telecommunication networks is specified in 3GPP TS 31.102.


1   Scope   p. 14
2   References
3   Definitions, symbols, abbreviations and coding conventions
4   Physical characteristics   p. 21
5   Electrical specifications of the UICC - Terminal interface
6   Initial communication establishment procedures   p. 32
7   Transmission protocols
7.0   Introduction
7.1   Physical layer   p. 38
7.2   Data link layer
7.3   Transport layer
7.4   Application layer
8   Application and file structure   p. 56
9   Security features   p. 66
10   Structure of commands and responses   p. 74
11   Commands
11.1   Generic commands
11.1.0   Introduction
11.1.1   SELECT
11.1.2   STATUS   p. 94      Up
11.1.3   READ BINARY   p. 95
11.1.4   UPDATE BINARY
11.1.5   READ RECORD
11.1.6   UPDATE RECORD
11.1.7   SEARCH RECORD
11.1.8   INCREASE   p. 100
11.1.9   VERIFY PIN   p. 101
11.1.10   CHANGE PIN
11.1.11   DISABLE PIN
11.1.12   ENABLE PIN
11.1.13   UNBLOCK PIN
11.1.14   DEACTIVATE FILE      Up
11.1.15   ACTIVATE FILE
11.1.16   AUTHENTICATE
11.1.17   MANAGE CHANNEL   p. 111
11.1.18   GET CHALLENGE   p. 112
11.1.19   TERMINAL CAPABILITY
11.1.20   MANAGE SECURE CHANNEL      Up
11.1.21   TRANSACT DATA   p. 125      Up
11.2   CAT commands   p. 128
11.3   Data Oriented commands
12   Transmission oriented commands
13   Application independent files
14   Application independent protocol   p. 143
15   Support of APDU-based UICC applications over USB
A  (normative)   UCS2 coding of Alpha fields for files residing on the UICC   p. 149
B   Main states of a UICC   p. 151
C   APDU protocol transmission examples   p. 152
D   ATR examples   p. 155
E   Security attributes mechanisms and examples   p. 157
F   Example of contents of EFARR '2F06'   p. 160
G   Access Rules Referencing (ARR)   p. 161
H  (normative)   List of SFI Values assigned in ETSI TS 102 221   p. 165
I   Resets and modes of operation   p. 166
J   Example of the use of PINs   p. 167
K   Examples of the PIN state transition on multi verification capable UICC   p. 168
L   Examples of SET DATA and RETRIEVE DATA usage   p. 174
M   Examples of ODD AUTHENTICATE instruction code usage   p. 178
N   Change history   p. 182

Top